Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 10. Отображено 10.
05-05-2023 дата публикации

控鱼器

Номер: CN308021775S
Автор: 王连海
Принадлежит: 王连海

Подробнее
12-09-2017 дата публикации

For western-style handkerchief bag tooth sample preparation method

Номер: CN0104997217B
Принадлежит:

... 本发明涉及种西服手巾袋袋牙样板的制作方法,采用如下步骤制作:、作手巾袋袋牙样板abcd和手巾袋袋牙挡口净样板b'adc',所述手巾袋袋牙样板abcd和手巾袋袋牙挡口净样板b'adc'以ad边线对称;二、作划线槽;三、作手巾袋袋牙挡口净样板;四、作手巾袋牙挡口连接袋布裁片样板;五、作手巾袋袋牙清剪样板;六、作手巾袋袋牙净样板连接西服正面缝头样板:使用本发明方法制作的西服手巾袋袋牙样板,直接裁剪后制作者可简便快捷整烫手巾袋袋牙,不需多次清剪,既保证了产品质量,又提高了工作效率。 ...

Подробнее
07-04-2023 дата публикации

Smart contract vulnerability detection method and system based on HOG and DRSN-LSTM

Номер: CN115937878A
Принадлежит:

The invention belongs to the technical field of blockchain smart contract security, and provides a smart contract vulnerability detection method and system based on HOG and DRSN-LSTM. The method comprises the following steps: acquiring a contract byte code running in real time, converting the contract byte code into a grey-scale map, and carrying out scaling processing on the grey-scale map by adopting a bicubic difference algorithm; performing feature extraction on the scaled grey-scale map by adopting an HOG algorithm to obtain a feature map; drawing the feature map by adopting a gradient histogram to obtain the gradient histogram; based on the gradient histogram, adopting a DRSN-LSTM model to obtain an intelligent contract vulnerability type; the DRSN-LSTM model comprises a first layer, a second layer, a third layer, a fourth layer, a fifth layer, a sixth layer and a seventh layer, wherein each of the first layer and the second layer comprises a standardization layer, a Relu and a convolution ...

Подробнее
14-04-2023 дата публикации

Malicious code detection method and system based on memory forensics and deep learning

Номер: CN115964710A
Принадлежит:

The invention discloses a malicious code detection method and system based on memory evidence obtaining and deep learning, and relates to the technical field of computer malicious software detection. Comprising the following steps: collecting static executable malicious samples and benign samples; the method comprises the following steps of: performing isolation operation through a sandbox, then dumping an operated system mirror image, and extracting all exe files and DLL files in the mirror image through a memory analysis and extraction technology; and scanning and detecting all the extracted files to ensure the authenticity of malicious samples. The DLL file and the exe are converted into a grayscale image and an operation behavior sequence, and then a benign data set and a malicious data set are divided; according to the method, the built CNN-Attention model and the built GNN-LSTM-Attention model are fused and complemented in a deep learning mode, so that the malicious code detection ...

Подробнее
06-06-2023 дата публикации

Internet of vehicles data security sharing method and system based on block chain and dynamic reputation

Номер: CN116233177A
Автор: WANG LIANHAI, GUAN CHENXI
Принадлежит:

The invention discloses an Internet of Vehicles data security sharing method and system based on a block chain and dynamic reputation, and relates to the technical field of data security and privacy protection, a training task is issued through the block chain, and model parameters and reputation values of participating nodes are stored in a decentralized mode; verifying the legality of the vehicle node and the RSU node; in combination with secret sharing and Multi-Krum algorithm, RSU is added to screen and aggregate model parameters uploaded by vehicle nodes; in the reputation evaluation process, a subjective logic model is improved, weights are set for different data sets, the Bayesian theory is adopted to eliminate uncertain interaction events occurring in vehicle nodes in the training process, and reputation evaluation is performed on RSU nodes and the vehicle nodes according to historical interaction behaviors of participating nodes. And realizing on-chain secure storage of global ...

Подробнее
29-08-2023 дата публикации

Block chain-based data operation behavior credible auditing system and method

Номер: CN116663015A
Принадлежит:

According to the block chain-based data operation behavior credible auditing system and method provided by the invention, the block chain is utilized to store the operation authority table and the data operation behavior log, so that the credibility and the security of the data operation behavior data are guaranteed; by utilizing an on-chain and off-chain cooperation mode, an intelligent contract is called to realize data operation behavior log integrity, operation behavior information credibility and operation behavior compliance auditing in a credible execution environment, operation authority, operation behavior data and intermediate calculation results thereof are not leaked, privacy of a data owner and a data requester is fully guaranteed, and data operation efficiency is improved. And credible auditing of the data operation behavior is realized.

Подробнее
04-07-2023 дата публикации

Supervisable block chain dynamic fragment design method and system

Номер: CN116389483A
Принадлежит:

The invention provides a supervisible block chain dynamic fragmentation design method and system, and relates to the technical field of block chains, and the method comprises the steps: electing a leader and an alternative leader of each fragmentation based on a reputation mechanism in the structures of two kinds of fragmentation of a supervision committee and a common fragmentation; after fragment configuration is completed, the supervision committee distributes transactions to different fragments, the supervision committee cooperates with the fragments to perform consensus verification, and finally subblocks of the transactions are generated; on the basis of the sub-blocks, the supervision committee updates the reputation list of the round, votes for the nodes which do not reach the trust threshold and then carries out expelling processing, and a final block is generated; and finally, performing committee dynamic reconfiguration based on the reputation list and forming a fragmentation ...

Подробнее
23-05-2023 дата публикации

Efficient energy-saving carbon dioxide drying device

Номер: CN116139663A
Принадлежит:

The invention discloses an efficient energy-saving carbon dioxide drying device which comprises a tower body and a drying layer arranged in the tower body, the tower body is communicated with a breather pipe, and an upper regeneration unit directly communicated with the upper portion of the drying layer and a lower regeneration unit directly communicated with the lower portion of the drying layer are further installed in the tower body. The system further comprises a switching unit. According to the technical scheme, according to the efficient energy-saving carbon dioxide drying device, regenerated gas is sprayed out of the upper-layer regeneration unit and conducts drying regeneration on the upper portion of the drying layer, and after the upper-layer regeneration unit conducts regeneration work for a period of time, a channel between the regeneration pipe and the lower-layer regeneration unit is automatically opened through the switching unit; thus, the regeneration gas is ejected from ...

Подробнее
18-04-2023 дата публикации

Mobile medical internet of things fine-grained access control method and system based on block chain

Номер: CN115987592A
Принадлежит:

The invention provides a block chain-based fine-grained access control method and system for a mobile medical internet of things, and belongs to the field of information security. Comprising the following steps: a data requester sends an attribute set to a trusted authorization center to obtain an attribute key; the data owner encrypts to-be-shared data to obtain a ciphertext, sends the ciphertext to a cloud service provider, and sends an access strategy, an authentication ciphertext and a ciphertext address to a block chain network; the data requester sends the attribute set to a block chain network for access authority authentication, and the block chain network sends a ciphertext address to the data requester; and the data requester sends the conversion key and the ciphertext address to the cloud service provider, the cloud service provider carries out ciphertext conversion and sends a conversion result to the data requester, and the data requester carries out user decryption and verification ...

Подробнее
30-06-2023 дата публикации

Malicious code detection method and system based on multi-source collaboration and behavior analysis

Номер: CN116361797A
Принадлежит:

The invention discloses a malicious code detection method and system based on multi-source collaboration and behavior analysis, and relates to the technical field of malicious software detection. The method comprises the following steps: respectively obtaining static executable benign samples and malicious samples, and labeling the static executable benign samples and malicious samples; putting the marked benign sample and malicious sample into a sandbox for operation; the operated sample data is converted into three kinds of gray level images through preprocessing operation; extracting features of the three gray level images respectively, fusing the extracted features and converting the fused features into color images; and training the neural network model by using the color image to generate a malicious code detection model, and detecting and classifying malicious codes by using the malicious code detection model. According to the method, by detecting the memory data, detection can be ...

Подробнее